Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?
Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?A . NIC teaming B. Load balancer C. RAID array D. PDUsView AnswerAnswer: A
Which of the following needs to be configured on the server?
A network engineer performs the following tasks to increase server bandwidth: Connects two network cables from the server to a switch stack Configure LACP on the switchports Verifies the correct configurations on the switch interfaces Which of the following needs to be configured on the server?A . Load balancing B....
Which of the following attacks did the network administrator prevent?
A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?A . Evil twin B. Tailgating C. Piggybacking D. Shoulder surfingView AnswerAnswer: B
Which of the following would be the MOST appropriate way to enable secure remote printing?
A local firm has hired a consulting company to clean up its IT infrastructure. The consulting company notices remote printing is accomplished by port forwarding via publicly accessible IPs through the firm's firewall. Which of the following would be the MOST appropriate way to enable secure remote printing?A . SSH...
Which of the following switch features will MOST likely be used to assist with this task?
An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task?A . Spanning Tree Protocol B. Neighbor Discovery Protocol C. Link Aggregation Control...
Which of the following can the administrator do to MOST easily mitigate this issue?
A network administrator discovers that users in an adjacent building are connecting to the company’s guest wireless network to download inappropriate material. Which of the following can the administrator do to MOST easily mitigate this issue?A . Reduce the wireless power levels B. Adjust the wireless channels C. Enable wireless...
Which of the following allows the enforcement of this policy?
Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?A . Motion detection B. Access control vestibules C. Smart lockers D. CamerasView AnswerAnswer: B Explanation: The most...
CORRECT TEXT
CORRECT TEXT SIMULATION You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters: The SSIDs need to be configured as CorpNet with a key of S3cr3t! The wireless...
Which of the following is the number of additional network connections needed?
An organization with one core and five distribution switches is transitioning from a star to a full-mesh topology. Which of the following is the number of additional network connections needed?A . 5 B. 7 C. 10 D. 15View AnswerAnswer: A
Which of the following should a network security administrator recommend to assist with detecting these activities?
A website administrator is concerned the company’s static website could be defaced by hacktivists or used as a pivot point to attack internal systems. Which of the following should a network security administrator recommend to assist with detecting these activities?A . Implement file integrity monitoring. B. Change the default credentials....